首页 > 最新文献

Journal of Cyber Security and Mobility最新文献

英文 中文
Timestamp Based OTP and Enhanced RSA Key Exchange Scheme with SIT Encryption to Secure IoT Devices 基于时间戳的OTP和带有SIT加密的增强RSA密钥交换方案,以保护物联网设备
Q3 Computer Science Pub Date : 2023-03-07 DOI: 10.13052/jcsm2245-1439.1214
V. Kollipara, Sai Koushik Kalakota, Sujith Chamarthi, S. Ramani, Preeti Malik, Marimuthu Karuppiah
The Internet of Things (IoT) has become an emerging technology and is expected to connect billions of more devices to the internet in the near future. With time, more and more devices like wearables, intelligent home systems, and industrial automation devices are getting connected to the internet. IoT devices primarily transfer data using wireless communication networks, introducing more vulnerabilities like man-in-the-middle-attacks and eavesdropping. These security concerns are customary for any device communicating over the internet because of its intrinsic open nature. These problems are usually subdued by conventional cryptographic algorithms used in typical systems that are power-hungry and computationally intensive, making them infeasible to be used in IoT devices since they run on low-powered chips, limiting performance, memory, and bandwidth. Hence, there is a requirement to adopt lightweight cryptographic algorithms that can abate the security issues while using low computational resources, which is the constraint in the given scenario. Hence, we propose an end-to-end secured IoT system that ensures the system’s integrity is never compromised using lightweight cryptographic algorithms. We propose a three-module system, where the first module handles user authentication using a time-based one-time password, the second secures communication using lightweight enhanced RSA, and the third performs data encryption using Feistel-based enhanced SIT. This kind of system is designed to deal with security challenges in IoT devices, ensuring adequate data security while reducing the computational footprint using lightweight cryptography.
物联网(IoT)已经成为一项新兴技术,预计在不久的将来将有数十亿台设备连接到互联网。随着时间的推移,越来越多的设备,如可穿戴设备、智能家居系统和工业自动化设备正在连接到互联网。物联网设备主要使用无线通信网络传输数据,引入了更多漏洞,如中间人攻击和窃听。由于互联网固有的开放性,这些安全问题对于任何通过互联网进行通信的设备来说都是习以为常的。这些问题通常被典型系统中使用的传统加密算法所抑制,这些系统耗电且计算密集型,使得它们无法用于物联网设备,因为它们运行在低功耗芯片上,限制了性能、内存和带宽。因此,需要采用轻量级加密算法,在使用低计算资源的同时减轻安全问题,这是给定场景中的约束。因此,我们提出了一个端到端安全的物联网系统,确保系统的完整性永远不会使用轻量级加密算法受到损害。我们提出了一个三模块系统,其中第一个模块使用基于时间的一次性密码处理用户身份验证,第二个模块使用轻量级增强型RSA保护通信,第三个模块使用基于feistel的增强型SIT执行数据加密。这种系统旨在应对物联网设备中的安全挑战,确保足够的数据安全性,同时使用轻量级加密技术减少计算占用。
{"title":"Timestamp Based OTP and Enhanced RSA Key Exchange Scheme with SIT Encryption to Secure IoT Devices","authors":"V. Kollipara, Sai Koushik Kalakota, Sujith Chamarthi, S. Ramani, Preeti Malik, Marimuthu Karuppiah","doi":"10.13052/jcsm2245-1439.1214","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1214","url":null,"abstract":"The Internet of Things (IoT) has become an emerging technology and is expected to connect billions of more devices to the internet in the near future. With time, more and more devices like wearables, intelligent home systems, and industrial automation devices are getting connected to the internet. IoT devices primarily transfer data using wireless communication networks, introducing more vulnerabilities like man-in-the-middle-attacks and eavesdropping. These security concerns are customary for any device communicating over the internet because of its intrinsic open nature. These problems are usually subdued by conventional cryptographic algorithms used in typical systems that are power-hungry and computationally intensive, making them infeasible to be used in IoT devices since they run on low-powered chips, limiting performance, memory, and bandwidth. Hence, there is a requirement to adopt lightweight cryptographic algorithms that can abate the security issues while using low computational resources, which is the constraint in the given scenario. Hence, we propose an end-to-end secured IoT system that ensures the system’s integrity is never compromised using lightweight cryptographic algorithms. We propose a three-module system, where the first module handles user authentication using a time-based one-time password, the second secures communication using lightweight enhanced RSA, and the third performs data encryption using Feistel-based enhanced SIT. This kind of system is designed to deal with security challenges in IoT devices, ensuring adequate data security while reducing the computational footprint using lightweight cryptography.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"40 1","pages":"77-102"},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80141549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of a Smart City Network Information Security Evaluation Model Based on GRA-BPNN 基于GRA-BPNN的智慧城市网络信息安全评估模型构建
Q3 Computer Science Pub Date : 2023-01-31 DOI: 10.13052/jcsm2245-1439.1162
Xiang Li
In this study, we propose an optimized network information security evaluation GRA-BPNN model based on gray correlation analysis method combined with BP neural network model, and make corresponding optimization for network information security evaluation index. Simulation experiments are conducted to analyze the experimental model, and the simulation results show that the test sample values reach the best training performance at the 7th iteration after 13 iterations, and the R-values in the regression of training results all reach above 0.99, and the data are well-fitted. When the number of training iterations reaches 13, the training gradient is 0.00067928, the value of Mu is 0.001, and the validity test value is 6. The GRA-BPNN model scores 0.028 higher than the GRA method, which is in line with the expected error, and the higher score also proves that the GRA-BPNN model is more comprehensive and specific in its scoring consideration.
本研究提出了一种基于灰色关联分析方法与BP神经网络模型相结合的网络信息安全评价优化GRA-BPNN模型,并对网络信息安全评价指标进行了相应的优化。对实验模型进行仿真实验分析,仿真结果表明,经过13次迭代后,在第7次迭代时,测试样本值达到最佳训练性能,训练结果回归中的r值均达到0.99以上,数据拟合良好。当训练迭代次数达到13次时,训练梯度为0.00067928,Mu值为0.001,效度检验值为6。GRA- bpnn模型得分比GRA方法高0.028分,符合预期误差,较高的得分也证明了GRA- bpnn模型在评分考虑上更加全面和具体。
{"title":"Construction of a Smart City Network Information Security Evaluation Model Based on GRA-BPNN","authors":"Xiang Li","doi":"10.13052/jcsm2245-1439.1162","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1162","url":null,"abstract":"In this study, we propose an optimized network information security evaluation GRA-BPNN model based on gray correlation analysis method combined with BP neural network model, and make corresponding optimization for network information security evaluation index. Simulation experiments are conducted to analyze the experimental model, and the simulation results show that the test sample values reach the best training performance at the 7th iteration after 13 iterations, and the R-values in the regression of training results all reach above 0.99, and the data are well-fitted. When the number of training iterations reaches 13, the training gradient is 0.00067928, the value of Mu is 0.001, and the validity test value is 6. The GRA-BPNN model scores 0.028 higher than the GRA method, which is in line with the expected error, and the higher score also proves that the GRA-BPNN model is more comprehensive and specific in its scoring consideration.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"83 1","pages":"755-776"},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85558597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Physical Layer Key Generation Method Based on SVD Pre-processing 基于SVD预处理的物理层密钥生成方法
Q3 Computer Science Pub Date : 2023-01-31 DOI: 10.13052/jcsm2245-1439.1163
Zehui Liu, Min Guo, Yun Ju
Environmental factors such as channel noise and hardware fingerprints affect the encryption effect of physical layer key generation techniques, resulting in low consistency of generated keys. Feature pre-processing is a common means of improving consistency of keys. However, most of the existing feature pre-processing algorithms improve key consistency by sacrificing key generation rate, which is not very usable. Therefore, it is proposed a physical layer key generation method based on SVD pre-processing. This method uses the SVD feature processing algorithm to pre-process the channel features extracted from both sides of the communication before quantization, in order to simultaneously improve key consistency and key generation rate. The simulation results show that when the channel SNR is greater than 10 dB, the BER of the SVD scheme is significantly lower compared to the scheme without pre-processing and the DCT and PCA pre-processing schemes; when the SNR is greater than 20 dB, the SVD scheme KGR can reach a level of 10bit/s, which is significantly higher than the other three schemes. The results show that this scheme can significantly increase the key generation rate while effectively improving key consistency.
信道噪声、硬件指纹等环境因素会影响物理层密钥生成技术的加密效果,导致生成的密钥一致性较低。特征预处理是提高密钥一致性的常用手段。然而,现有的特征预处理算法大多是通过牺牲密钥生成速率来提高密钥一致性的,实用性不高。为此,提出了一种基于奇异值分解预处理的物理层密钥生成方法。该方法利用SVD特征处理算法对从通信双方提取的信道特征进行预处理,然后再进行量化,从而同时提高密钥一致性和密钥生成率。仿真结果表明,当信道信噪比大于10 dB时,SVD方案的误码率明显低于未经预处理的方案以及DCT和PCA预处理方案;当信噪比大于20 dB时,SVD方案的KGR可以达到10bit/s的水平,显著高于其他三种方案。结果表明,该方案可以显著提高密钥生成速率,同时有效提高密钥一致性。
{"title":"Physical Layer Key Generation Method Based on SVD Pre-processing","authors":"Zehui Liu, Min Guo, Yun Ju","doi":"10.13052/jcsm2245-1439.1163","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1163","url":null,"abstract":"Environmental factors such as channel noise and hardware fingerprints affect the encryption effect of physical layer key generation techniques, resulting in low consistency of generated keys. Feature pre-processing is a common means of improving consistency of keys. However, most of the existing feature pre-processing algorithms improve key consistency by sacrificing key generation rate, which is not very usable. Therefore, it is proposed a physical layer key generation method based on SVD pre-processing. This method uses the SVD feature processing algorithm to pre-process the channel features extracted from both sides of the communication before quantization, in order to simultaneously improve key consistency and key generation rate. The simulation results show that when the channel SNR is greater than 10 dB, the BER of the SVD scheme is significantly lower compared to the scheme without pre-processing and the DCT and PCA pre-processing schemes; when the SNR is greater than 20 dB, the SVD scheme KGR can reach a level of 10bit/s, which is significantly higher than the other three schemes. The results show that this scheme can significantly increase the key generation rate while effectively improving key consistency.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"158 1","pages":"777-794"},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75057397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Strategies for SMEs in the Nordic Baltic Region 北欧波罗的海地区中小企业的网络安全战略
Q3 Computer Science Pub Date : 2023-01-31 DOI: 10.13052/jcsm2245-1439.1161
M. Falch, H. Olesen, K. Skouby, R. Tadayoni, Idongesit Williams
Cybercrime has become the most widespread kind of economic fraud and is a serious challenge for businesses around the world. The topic of this paper is how SMEs in the Nordic Baltic Region should face this challenge. Possible technical and organisational tasks to be performed by SMEs in order to ensure cybersecurity of their business are analysed. The paper looks at the different types of hackers and their motives. On this background, current cyberthreats and corresponding security measures are presented. It is concluded that awareness, training, and financial incentives are all important elements in defining a cybersecurity strategy for SMEs. The paper is based on research made in the DINNOCAP project funded by EU regional funds.
网络犯罪已经成为最普遍的一种经济欺诈,对全世界的企业都是一个严重的挑战。本文的主题是北欧波罗的海地区的中小企业应该如何面对这一挑战。中小企业可能执行的技术和组织任务,以确保对其业务的网络安全进行分析。本文探讨了不同类型的黑客及其动机。在此背景下,介绍了当前的网络威胁和相应的安全措施。结论是,意识、培训和财务激励都是确定中小企业网络安全战略的重要因素。本文基于欧盟区域基金资助的DINNOCAP项目所做的研究。
{"title":"Cybersecurity Strategies for SMEs in the Nordic Baltic Region","authors":"M. Falch, H. Olesen, K. Skouby, R. Tadayoni, Idongesit Williams","doi":"10.13052/jcsm2245-1439.1161","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1161","url":null,"abstract":"Cybercrime has become the most widespread kind of economic fraud and is a serious challenge for businesses around the world. The topic of this paper is how SMEs in the Nordic Baltic Region should face this challenge. Possible technical and organisational tasks to be performed by SMEs in order to ensure cybersecurity of their business are analysed. The paper looks at the different types of hackers and their motives. On this background, current cyberthreats and corresponding security measures are presented. It is concluded that awareness, training, and financial incentives are all important elements in defining a cybersecurity strategy for SMEs. The paper is based on research made in the DINNOCAP project funded by EU regional funds.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"11 1","pages":"727-754"},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72454902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Seeded Transfer Learning for Enhanced Attack Trace and Effective Deception 增强攻击跟踪和有效欺骗的种子迁移学习
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.32604/jcs.2023.040186
Jalaj Pateria, Laxmi Ahuja, S. Som
,
{"title":"Seeded Transfer Learning for Enhanced Attack Trace and Effective Deception","authors":"Jalaj Pateria, Laxmi Ahuja, S. Som","doi":"10.32604/jcs.2023.040186","DOIUrl":"https://doi.org/10.32604/jcs.2023.040186","url":null,"abstract":",","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81787908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Machine Learning Models for PDF Malware Detection: Evaluating Different Training and Testing Criteria PDF恶意软件检测的机器学习模型比较分析:评估不同的训练和测试标准
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.32604/jcs.2023.042501
Bilal Khan, Muhammad Arshad, Sarwar Shah Khan
The proliferation of maliciously coded documents as file transfers increase has led to a rise in sophisticated attacks. Portable Document Format (PDF) files have emerged as a major attack vector for malware due to their adaptability and wide usage. Detecting malware in PDF files is challenging due to its ability to include various harmful elements such as embedded scripts, exploits, and malicious URLs. This paper presents a comparative analysis of machine learning (ML) techniques, including Naive Bayes (NB), K-Nearest Neighbor (KNN), Average One Dependency Estimator (A1DE), Random Forest (RF), and Support Vector Machine (SVM) for PDF malware detection. The study utilizes a dataset obtained from the Canadian Institute for Cyber-security and employs different testing criteria, namely percentage splitting and 10-fold cross-validation. The performance of the techniques is evaluated using F1-score, precision, recall, and accuracy measures. The results indicate that KNN outperforms other models, achieving an accuracy of 99.8599% using 10-fold cross-validation. The findings highlight the effectiveness of ML models in accurately detecting PDF malware and provide insights for developing robust systems to protect against malicious activities.
随着文件传输的增加,恶意编码文档的激增导致了复杂攻击的增加。可移植文档格式(PDF)文件由于其适应性和广泛的使用,已成为恶意软件的主要攻击载体。检测PDF文件中的恶意软件具有挑战性,因为它能够包含各种有害元素,如嵌入式脚本、漏洞利用和恶意url。本文介绍了机器学习(ML)技术的比较分析,包括用于PDF恶意软件检测的朴素贝叶斯(NB), k近邻(KNN),平均一依赖估计器(A1DE),随机森林(RF)和支持向量机(SVM)。该研究利用了从加拿大网络安全研究所获得的数据集,并采用了不同的测试标准,即百分比分割和10倍交叉验证。使用f1评分、精确度、召回率和准确性来评估这些技术的性能。结果表明,KNN优于其他模型,通过10倍交叉验证,准确率达到99.8599%。研究结果强调了机器学习模型在准确检测PDF恶意软件方面的有效性,并为开发强大的系统来防止恶意活动提供了见解。
{"title":"Comparative Analysis of Machine Learning Models for PDF Malware Detection: Evaluating Different Training and Testing Criteria","authors":"Bilal Khan, Muhammad Arshad, Sarwar Shah Khan","doi":"10.32604/jcs.2023.042501","DOIUrl":"https://doi.org/10.32604/jcs.2023.042501","url":null,"abstract":"The proliferation of maliciously coded documents as file transfers increase has led to a rise in sophisticated attacks. Portable Document Format (PDF) files have emerged as a major attack vector for malware due to their adaptability and wide usage. Detecting malware in PDF files is challenging due to its ability to include various harmful elements such as embedded scripts, exploits, and malicious URLs. This paper presents a comparative analysis of machine learning (ML) techniques, including Naive Bayes (NB), K-Nearest Neighbor (KNN), Average One Dependency Estimator (A1DE), Random Forest (RF), and Support Vector Machine (SVM) for PDF malware detection. The study utilizes a dataset obtained from the Canadian Institute for Cyber-security and employs different testing criteria, namely percentage splitting and 10-fold cross-validation. The performance of the techniques is evaluated using F1-score, precision, recall, and accuracy measures. The results indicate that KNN outperforms other models, achieving an accuracy of 99.8599% using 10-fold cross-validation. The findings highlight the effectiveness of ML models in accurately detecting PDF malware and provide insights for developing robust systems to protect against malicious activities.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136160128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discovering the Common Traits of Cybercrimes in Pakistan Using Associative Classification with Ant Colony Optimization 基于蚁群优化的关联分类发现巴基斯坦网络犯罪的共同特征
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.32604/jcs.2022.038791
Abdul Rauf, M. Asif Khan, Hamid Hussain Awan, W. Shahzad, Najeeb Ul Husaan
: In the modern world, law enforcement authorities are facing challenges due to the advanced technology used by criminals to commit crimes. Criminals follow specific patterns to carry out their crimes, which can be identified using machine learning and swarm intelligence approaches. This article proposes the use of the Ant Colony Optimization algorithm to create an associative classification of crime data, which can reveal potential relationships between different features and crime types. The experiments conducted in this research show that this approach can discover various associations among the features of crime data and the specific patterns that major crime types depend on. This research can be beneficial in discovering the patterns leading to a specific class of crimes, allowing law enforcement agencies to take proactive measures to prevent them. Experimental results demonstrate that ACO-based associative classification model predicted 10 out of 16 crime types with 90% or more accuracy based on discovery of association among dataset features. Hence, the proposed approach is a viable tool for application in forensic and investigation of crimes.
在现代世界,由于犯罪分子使用先进的技术进行犯罪,执法当局面临着挑战。犯罪分子遵循特定的模式来实施犯罪,这些模式可以使用机器学习和群体智能方法来识别。本文提出使用蚁群优化算法对犯罪数据进行关联分类,可以揭示不同特征与犯罪类型之间的潜在关系。本研究的实验表明,该方法可以发现犯罪数据特征与主要犯罪类型所依赖的特定模式之间的各种关联。这项研究有助于发现导致特定类别犯罪的模式,使执法机构能够采取积极措施预防犯罪。实验结果表明,基于aco的关联分类模型在发现数据集特征之间的关联的基础上,对16种犯罪类型中10种的预测准确率达到90%以上。因此,所提出的方法是一种适用于法医和犯罪调查的可行工具。
{"title":"Discovering the Common Traits of Cybercrimes in Pakistan Using Associative Classification with Ant Colony Optimization","authors":"Abdul Rauf, M. Asif Khan, Hamid Hussain Awan, W. Shahzad, Najeeb Ul Husaan","doi":"10.32604/jcs.2022.038791","DOIUrl":"https://doi.org/10.32604/jcs.2022.038791","url":null,"abstract":": In the modern world, law enforcement authorities are facing challenges due to the advanced technology used by criminals to commit crimes. Criminals follow specific patterns to carry out their crimes, which can be identified using machine learning and swarm intelligence approaches. This article proposes the use of the Ant Colony Optimization algorithm to create an associative classification of crime data, which can reveal potential relationships between different features and crime types. The experiments conducted in this research show that this approach can discover various associations among the features of crime data and the specific patterns that major crime types depend on. This research can be beneficial in discovering the patterns leading to a specific class of crimes, allowing law enforcement agencies to take proactive measures to prevent them. Experimental results demonstrate that ACO-based associative classification model predicted 10 out of 16 crime types with 90% or more accuracy based on discovery of association among dataset features. Hence, the proposed approach is a viable tool for application in forensic and investigation of crimes.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80957316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit Card Fraud Detection on Original European Credit Card Holder Dataset Using Ensemble Machine Learning Technique 基于集成机器学习技术的欧洲原始信用卡持卡人数据集的信用卡欺诈检测
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.32604/jcs.2023.045422
Yih Bing Chu, Zhi Min Lim, Bryan Keane, Ping Hao Kong, Ahmed Rafat Elkilany, Osama Hisham Abusetta
The proliferation of digital payment methods facilitated by various online platforms and applications has led to a surge in financial fraud, particularly in credit card transactions. Advanced technologies such as machine learning have been widely employed to enhance the early detection and prevention of losses arising from potentially fraudulent activities. However, a prevalent approach in existing literature involves the use of extensive data sampling and feature selection algorithms as a precursor to subsequent investigations. While sampling techniques can significantly reduce computational time, the resulting dataset relies on generated data and the accuracy of the pre-processing machine learning models employed. Such datasets often lack true representativeness of real-world data, potentially introducing secondary issues that affect the precision of the results. For instance, under-sampling may result in the loss of critical information, while over-sampling can lead to overfitting machine learning models. In this paper, we proposed a classification study of credit card fraud using fundamental machine learning models without the application of any sampling techniques on all the features present in the original dataset. The results indicate that Support Vector Machine (SVM) consistently achieves classification performance exceeding 90% across various evaluation metrics. This discovery serves as a valuable reference for future research, encouraging comparative studies on original dataset without the reliance on sampling techniques. Furthermore, we explore hybrid machine learning techniques, such as ensemble learning constructed based on SVM, K-Nearest Neighbor (KNN) and decision tree, highlighting their potential advancements in the field. The study demonstrates that the proposed machine learning models yield promising results, suggesting that pre-processing the dataset with sampling algorithm or additional machine learning technique may not always be necessary. This research contributes to the field of credit card fraud detection by emphasizing the potential of employing machine learning models directly on original datasets, thereby simplifying the workflow and potentially improving the accuracy and efficiency of fraud detection systems.
各种在线平台和应用程序促进了数字支付方式的激增,导致金融欺诈激增,尤其是信用卡交易。机器学习等先进技术已被广泛用于加强早期发现和预防潜在欺诈活动造成的损失。然而,在现有文献中,一种流行的方法涉及使用广泛的数据采样和特征选择算法作为后续研究的先驱。虽然采样技术可以显著减少计算时间,但最终的数据集依赖于生成的数据和所采用的预处理机器学习模型的准确性。这样的数据集通常缺乏真实世界数据的真正代表性,可能会引入影响结果精度的次要问题。例如,欠采样可能导致关键信息的丢失,而过采样可能导致机器学习模型的过拟合。在本文中,我们提出了一种使用基本机器学习模型的信用卡欺诈分类研究,而无需对原始数据集中存在的所有特征应用任何采样技术。结果表明,支持向量机(SVM)在各种评价指标上的分类性能均达到90%以上。这一发现为未来的研究提供了有价值的参考,鼓励了对原始数据集的比较研究,而不依赖于采样技术。此外,我们探讨了混合机器学习技术,如基于支持向量机、k -最近邻(KNN)和决策树构建的集成学习,突出了它们在该领域的潜在进展。该研究表明,提出的机器学习模型产生了有希望的结果,这表明使用采样算法或额外的机器学习技术预处理数据集可能并不总是必要的。这项研究强调了直接在原始数据集上使用机器学习模型的潜力,从而简化了工作流程,并有可能提高欺诈检测系统的准确性和效率,从而为信用卡欺诈检测领域做出了贡献。
{"title":"Credit Card Fraud Detection on Original European Credit Card Holder Dataset Using Ensemble Machine Learning Technique","authors":"Yih Bing Chu, Zhi Min Lim, Bryan Keane, Ping Hao Kong, Ahmed Rafat Elkilany, Osama Hisham Abusetta","doi":"10.32604/jcs.2023.045422","DOIUrl":"https://doi.org/10.32604/jcs.2023.045422","url":null,"abstract":"The proliferation of digital payment methods facilitated by various online platforms and applications has led to a surge in financial fraud, particularly in credit card transactions. Advanced technologies such as machine learning have been widely employed to enhance the early detection and prevention of losses arising from potentially fraudulent activities. However, a prevalent approach in existing literature involves the use of extensive data sampling and feature selection algorithms as a precursor to subsequent investigations. While sampling techniques can significantly reduce computational time, the resulting dataset relies on generated data and the accuracy of the pre-processing machine learning models employed. Such datasets often lack true representativeness of real-world data, potentially introducing secondary issues that affect the precision of the results. For instance, under-sampling may result in the loss of critical information, while over-sampling can lead to overfitting machine learning models. In this paper, we proposed a classification study of credit card fraud using fundamental machine learning models without the application of any sampling techniques on all the features present in the original dataset. The results indicate that Support Vector Machine (SVM) consistently achieves classification performance exceeding 90% across various evaluation metrics. This discovery serves as a valuable reference for future research, encouraging comparative studies on original dataset without the reliance on sampling techniques. Furthermore, we explore hybrid machine learning techniques, such as ensemble learning constructed based on SVM, K-Nearest Neighbor (KNN) and decision tree, highlighting their potential advancements in the field. The study demonstrates that the proposed machine learning models yield promising results, suggesting that pre-processing the dataset with sampling algorithm or additional machine learning technique may not always be necessary. This research contributes to the field of credit card fraud detection by emphasizing the potential of employing machine learning models directly on original datasets, thereby simplifying the workflow and potentially improving the accuracy and efficiency of fraud detection systems.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135267830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Phishing Using a Multi-Layered Social Engineering Framework 基于多层社会工程框架的网络钓鱼检测
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.32604/jcs.2023.043359
Kofi Sarpong Adu-Manu, Richard Kwasi Ahiable
As businesses develop and expand with a significant volume of data, data protection and privacy become increasingly important. Research has shown a tremendous increase in phishing activities during and after COVID-19. This research aimed to improve the existing approaches to detecting phishing activities on the internet. We designed a multi-layered phish detection algorithm to detect and prevent phishing applications on the internet using URLs. In the algorithm, we considered technical dimensions of phishing attack prevention and mitigation on the internet. In our approach, we merge, Phishtank, Blacklist, Blocklist, and Whitelist to form our framework. A web application system and browser extension were developed to implement the algorithm. The multi-layer phish detector evaluated ten thousand URLs gathered randomly from the internet (five thousand phishing and five thousand legitimate URLs). The system was estimated to detect levels of accuracy, true-positive and false-positive values. The system level accuracy was recorded to be 98.16%. Approximately 49.6% of the websites were detected as illegitimate, whilst 49.8% were seen as legitimate.
随着业务的发展和扩展,数据量越来越大,数据保护和隐私变得越来越重要。研究表明,在COVID-19期间和之后,网络钓鱼活动急剧增加。本研究旨在改进现有的检测网络钓鱼活动的方法。我们设计了一种多层网络钓鱼检测算法,用于检测和防止网络上使用url的网络钓鱼应用程序。在算法中,我们考虑了网络钓鱼攻击预防和缓解的技术维度。在我们的方法中,我们合并,钓鱼坦克,黑名单,黑名单和白名单,以形成我们的框架。开发了一个web应用系统和浏览器扩展来实现该算法。多层网络钓鱼探测器评估了从互联网上随机收集的1万个网址(5000个钓鱼网址和5000个合法网址)。据估计,该系统可以检测准确率、真阳性和假阳性值。系统级准确度为98.16%。大约49.6%的网站被检测为非法网站,而49.8%被视为合法网站。
{"title":"Detecting Phishing Using a Multi-Layered Social Engineering Framework","authors":"Kofi Sarpong Adu-Manu, Richard Kwasi Ahiable","doi":"10.32604/jcs.2023.043359","DOIUrl":"https://doi.org/10.32604/jcs.2023.043359","url":null,"abstract":"As businesses develop and expand with a significant volume of data, data protection and privacy become increasingly important. Research has shown a tremendous increase in phishing activities during and after COVID-19. This research aimed to improve the existing approaches to detecting phishing activities on the internet. We designed a multi-layered phish detection algorithm to detect and prevent phishing applications on the internet using URLs. In the algorithm, we considered technical dimensions of phishing attack prevention and mitigation on the internet. In our approach, we merge, Phishtank, Blacklist, Blocklist, and Whitelist to form our framework. A web application system and browser extension were developed to implement the algorithm. The multi-layer phish detector evaluated ten thousand URLs gathered randomly from the internet (five thousand phishing and five thousand legitimate URLs). The system was estimated to detect levels of accuracy, true-positive and false-positive values. The system level accuracy was recorded to be 98.16%. Approximately 49.6% of the websites were detected as illegitimate, whilst 49.8% were seen as legitimate.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135058894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing Attacks in Social Engineering: A Review 网络钓鱼攻击在社会工程:综述
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.32604/jcs.2023.041095
Kofi Sarpong Adu-Manu, Richard Kwasi Ahiable, Justice Kwame Appati, Ebenezer Essel Mensah
{"title":"Phishing Attacks in Social Engineering: A Review","authors":"Kofi Sarpong Adu-Manu, Richard Kwasi Ahiable, Justice Kwame Appati, Ebenezer Essel Mensah","doi":"10.32604/jcs.2023.041095","DOIUrl":"https://doi.org/10.32604/jcs.2023.041095","url":null,"abstract":"","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78354850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cyber Security and Mobility
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1